EP2945090A1 - Terminal, procédé de déverrouillage et programme - Google Patents
Terminal, procédé de déverrouillage et programme Download PDFInfo
- Publication number
- EP2945090A1 EP2945090A1 EP14738232.9A EP14738232A EP2945090A1 EP 2945090 A1 EP2945090 A1 EP 2945090A1 EP 14738232 A EP14738232 A EP 14738232A EP 2945090 A1 EP2945090 A1 EP 2945090A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- terminal
- speech
- application
- user
- speech recognition
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims description 30
- 230000004913 activation Effects 0.000 claims description 14
- 239000000284 extract Substances 0.000 claims description 9
- 230000004044 response Effects 0.000 claims description 8
- 230000002093 peripheral effect Effects 0.000 claims description 7
- 230000003213 activating effect Effects 0.000 claims description 4
- 230000006870 function Effects 0.000 abstract description 15
- 238000010586 diagram Methods 0.000 description 12
- 235000014510 cooky Nutrition 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000003466 anti-cipated effect Effects 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/06—Creation of reference templates; Training of speech recognition systems, e.g. adaptation to the characteristics of the speaker's voice
- G10L15/065—Adaptation
- G10L15/07—Adaptation to the speaker
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/16—Sound input; Sound output
- G06F3/167—Audio in a user interface, e.g. using voice commands for navigating, audio feedback
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/22—Interactive procedures; Man-machine interfaces
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/22—Procedures used during a speech recognition process, e.g. man-machine dialogue
- G10L2015/223—Execution procedure of a spoken command
Definitions
- the present application claims priority from Japanese Patent Application No. 2013-002387 (filed on January 10, 2013 ), the content of which is hereby incorporated in its entirety by reference into this specification.
- the invention relates to a terminal, an unlocking method, and a program, and in particular to a terminal provided with voiceprint authentication and speech recognition functions, and an unlocking method and program for the terminal.
- a mobile terminal provided with a touch panel
- an authentication screen is displayed and a confirmation is made as to whether or not the user is legitimate.
- Known methods of performing authentication and releasing usage restrictions include a method based on password input, or a method based on the locus of a finger on a touch panel, or the like.
- a method is used wherein a particular operation that does not occur frequently on the touch panel is recommended to a user, and usage restrictions of the terminal are unlocked only in a case where the particular operation is accepted.
- the particular operation for example, may be an operation of sliding a finger only a fixed distance on the screen, or an operation such as a double tap of a particular region.
- Patent Literature 1 discloses an individual authentication device that uses biometric information such as fingerprint, voiceprint, face, or iris.
- Patent Literature 2 discloses a method of unlocking a mobile telephone based on a result of comparing a stored user voiceprint and speech uttered by a user.
- Patent Literature 3 discloses a speech recognition system in which an individual is authenticated based on voiceprint information extracted from inputted speech, and when authenticated speech is determined, commands from the speech in question are recognized, and a device is remotely operated by the recognized commands.
- Patent Literature 4 discloses a mobile terminal device in which voiceprint authentication is performed based on speech generated by a user, and depending on the authentication result, prescribed processing is executed or halted in accordance with the speech.
- Patent Literature 1 discloses an individual authentication device that uses a voiceprint as biometric information. According to this device, it is not necessary for the user to perform an operation by a finger. Furthermore, an unlocking method is known whereby a registered fixed phrase read out by the user himself is the password. However, there is a risk that the security level will drop due to another person hearing the fixed phrase being read.
- Patent Literature 1 In order to overcome the technical problem described in Patent Literature 1, it is possible to use, for example, an unlocking method using voiceprint authentication described in Patent Literature 2. However, since it is easier to perform an input operation to a screen by a finger than to expressly make an utterance for the purpose of unlocking a smart phone or tablet, there is a problem in that user convenience is not improved.
- a terminal in a locked state is not capable of speech reception; a user cannot immediately use a function of the terminal in a locked state; and a cumbersome operation is required in order to unlock the terminal.
- a terminal comprising: speech receiving means that receives speech in a locked state; voiceprint authentication means that performs voiceprint authentication based on the speech received in the locked state and determining whether or not a user is legitimate; speech recognition means that performs speech recognition of the speech received in the locked state; and execution means that executes an application using a result of the speech recognition.
- an unlocking method comprising: by a terminal, receiving speech in a locked state; performing voiceprint authentication based on the speech received in the locked state and determining whether or not a user is legitimate; performing speech recognition of the speech received in the locked state; and executing an application using a result of the speech recognition.
- a program causing a computer provided in a terminal to execute: receiving speech in a locked state; performing voiceprint authentication based on the speech received in the locked state and determining whether or not a user is legitimate; performing speech recognition of the speech received in the locked state; and executing an application using a result of the speech recognition.
- this program may be provided as a program product recorded on a non-transitory computer-readable storage medium.
- the unlocking method, and the program in accordance with the present invention, it is possible to easily unlock a terminal provided with voiceprint authentication and speech recognition functions.
- a terminal (10) is provided with: speech receiving means (14) that receives speech with the terminal (10) in a locked state; voiceprint authentication means (16) that performs voiceprint authentication based on the speech received in the locked state and determining whether or not the user is legitimate; speech recognition means (18) that performs speech recognition (for example, converting the speech into text data) of the speech received in the locked state; and execution means (22) that executes an application using a result of the speech recognition (for example, text data).
- speech receiving means (14) that receives speech with the terminal (10) in a locked state
- voiceprint authentication means (16) that performs voiceprint authentication based on the speech received in the locked state and determining whether or not the user is legitimate
- speech recognition means (18) that performs speech recognition (for example, converting the speech into text data) of the speech received in the locked state
- execution means (22) that executes an application using a result of the speech recognition (for example, text data).
- the terminal (10) With the terminal (10), by uttering the content of text (for example, a command, a keyword, or the like) for executing an application, a terminal user can unlock the terminal and execute the application. Therefore, the user of the terminal (10) need not make an utterance for the purpose only of unlocking the terminal. Consequently, with the terminal (10), it is possible to easily unlock a terminal having voiceprint authentication and speech recognition functions.
- a terminal having voiceprint authentication and speech recognition functions.
- a terminal (20) may be further provided with power activation means (12) that activates a power supply to the terminal (20) if a prescribed operation is detected.
- the speech receiving means (14) begins receiving the speech in a locked state if the power supply to the terminal (20) is activated in response to the prescribed operation.
- the terminal (20) in question with the terminal in a locked state, there is no necessity to continuously run a speech receiving operation by the speech receiving means (14), and it is possible to start the speech receiving operation by the speech receiving means (14) with an operation on the power activation means (12) as a trigger. Therefore, according to the terminal (20), it is possible to reduce power consumption in the locked state.
- a terminal (30) may be provided with sensor means (34) that measures a prescribed physical amount.
- the speech receiving means (14) begins receiving speech in the locked state if the physical amount (for example, vibration, heat) measured by the sensor means (34) is a prescribed value.
- the terminal (30) in question with the terminal in a locked state, there is no necessity to continuously run a speech receiving operation by the speech receiving means (14), and it is possible to start the speech receiving operation by the speech receiving means (14) with measurement of a prescribed physical amount by the sensor means (34) as a trigger. According to the terminal (30), by making the sensor means (34) operate with lower power consumption than the speech receiving means (14), it is possible to reduce power consumption in the locked state.
- the execution means (22) may execute an application using the result of the speech recognition, while allowing access to protected information stored in the terminal (10). On the other hand, if the voiceprint authentication does not determine that the user is legitimate, the execution means (22) may execute an application using the result of the speech recognition, while forbidding access to protected information stored in the terminal (10).
- the terminal (10) in question even in a case where it is not recognized by voiceprint authentication that the user is legitimate, it is possible to execute an application based on speech uttered by the user, while appropriately protecting information stored in the terminal (10). Therefore, according to the terminal (10), in a case of failure in recognizing by voiceprint authentication that the user is legitimate, it is possible to avoid a wasted utterance by the user.
- the terminal is not limited to a mobile telephone, smart phone etc., but may also be another electronic device such as a game console, a tablet terminal, a notebook PC (Personal Computer), a personal data assistant (PDA), a digital camera, a digital video camera, or the like.
- Applications operating using result(s) (for example, text data) of the speech recognition are not limited to applications such as speech recognition search (for example, web search), voice calls and the like, and may be other applications (for example, car navigation software, music reproduction software and the like) based on a speech recognition function.
- a description is given of a case where a result of speech recognition is text data, but the result of the speech recognition is not limited to text data.
- FIG. 1 is a block diagram showing an example of a configuration of the terminal according to the present exemplary embodiment.
- the terminal 10 is provided with speech receiving means 14, voiceprint authentication means 16, speech recognition means 18, and execution means 22.
- the speech receiving means 14 receives speech with the terminal 10 in a locked state.
- the voiceprint authentication means 16 performs voiceprint authentication based on the speech received in the locked state and determines whether or not the user is legitimate.
- the speech recognition means 18 converts the speech received in the locked state to text data by speech recognition.
- the execution means 22 executes an application using the text data.
- FIG. 2 is a block diagram showing an example of operations of the terminal 10 according to the present exemplary embodiment. Referring to FIG. 2 , a description is given concerning operations of the terminal 10.
- the speech receiving means 14 receives speech with the terminal 10 in a locked state (step A1).
- the voiceprint authentication means 16 performs voiceprint authentication based on the speech received in the locked state and determines whether or not the user is legitimate (step A2).
- the speech recognition means 18 converts the speech received in the locked state to text data by speech recognition (step A3). It is to be noted that the order of the voiceprint authentication and the speech recognition is not limited to the order shown in FIG. 2 . Furthermore, the voiceprint authentication and the speech recognition may be executed at the same time.
- the execution means 22 executes an application using the text data (step A4).
- the terminal 10 by uttering text so as to execute an application, a user of the terminal 10 can unlock the terminal 10 and execute the application. Therefore, the user of the terminal need not make an utterance for the purpose only of unlocking the terminal. Consequently, according to the terminal 10, it is possible to easily unlock a terminal having voiceprint authentication and speech recognition functions.
- FIG. 3 is a block diagram showing an example of a configuration of the terminal according to the present exemplary embodiment.
- the terminal 20 is provided with power activation means 12, speech receiving means 14, voiceprint authentication means 16, speech recognition means 18, execution means 22, touch panel means 24, display means 26, voiceprint storage means 28, and application storage means 32.
- the voiceprint storage means 28 is provided in advance with voiceprint information of a user of the terminal 20, in order to perform voiceprint authentication.
- the application storage means 32 holds an application that operates using text data (for example, a command, a keyword, or the like) extracted from speech by a speech recognition function, or an application activated based on the text data in question.
- text data for example, a command, a keyword, or the like
- an application activated based on the text data in question.
- an application also referred to simply as "app”
- a voice search application that performs web search and the like based on a search keyword given by a user
- a voice call application that makes a call based on a telephone number of another party given by the user, or the like, may be envisaged.
- applications are not limited to thereto.
- the power activation means 12 activates a power supply to the terminal 20 when a prescribed operation, such as a hardware key being pressed by the user, is detected.
- the speech receiving means 14 receives speech with the terminal 20 in a locked state.
- the speech receiving means 14 begins receiving the speech in a locked state, in a case where the power supply to the terminal 20 is activated in response to the abovementioned prescribed operation.
- the voiceprint authentication means compares the speech received in the locked state and the voiceprint information stored in the voiceprint storage means 28 to perform voiceprint authentication, and determines whether or not the user is legitimate.
- the speech recognition means 18 converts the speech received in the locked state to text data by speech recognition.
- the execution means 22 uses the text data obtained by the speech recognition means 18 to execute (or start up) an application stored in the application storage means 32.
- the execution means 22 executes an application using the text data obtained by the speech recognition, while allowing access to protected information stored in the terminal 20.
- the application is a voice search application
- the execution means 22 may perform a search using cookie information stored in the terminal 20.
- the execution means 22 executes an application using the text data, while forbidding access to protected information stored in the terminal 20.
- the execution means 22 need not execute or start up an application.
- the execution means 22 extracts applications related to word(s) included in the text data and displays the extracted application list on the display means 26 of the terminal 20.
- the touch panel means 24 receives input based on a touch operation by the user. It is to be noted that the touch panel means 24 and the display means 26 may have a configuration where they are mutually superimposed (for example, stuck together).
- FIG. 4 is a block diagram showing an example of operations of the terminal 20 ( FIG. 3 ). Referring to FIG. 4 , a description is given concerning operations of the terminal 20.
- the power activation means 12 activates the power supply to the terminal 20 (step B1). Then the speech receiving means 14 starts receiving speech in the locked state (step B2).
- the voiceprint authentication means 16 compares the speech received by the speech receiving means 14 with the terminal 20 in the locked state, and the voiceprint information stored in the voiceprint storage means 28, to determine whether or not the user is legitimate (step B3).
- the speech recognition means 18 converts the speech received by the speech receiving means 14 with the terminal 20 in the locked state, to text data by speech recognition (step B4).
- the execution means 22 executes an application stored in the application storage means 32 using the text data obtained by the speech recognition means 18. In a case of determining, by the voiceprint authentication means 16, that the user is legitimate (Yes in step B5), the execution means 22 executes an application using the text data, while allowing access (that is, normal mode) to protected information held by the terminal 20. For example, in a case where the application is an Internet search application based on speech recognition, the execution means 22 performs an Internet search using the text data and outputs result(s) of the Internet search to the display means 26.
- the execution means 22 extracts an application associated with the text data obtained by the speech recognition means 18 from the application storage means 32, to be displayed as a list on the display means 26 of the terminal 20 (step B7).
- the execution means 22 extracts applications associated with these keywords as a list of candidates to be started up, and displays the list on the display means 26.
- step B6 execution result(s) (step B6) of applications associated with content vocally inputted by the user and the list (step B7) of the applications in question are displayed on the display means 26 of the terminal 20.
- the touch panel means 24 receives this (step B8).
- the execution means 22 starts up the application selected by the user (step B9).
- the execution means 22 executes an application using the text data, while forbidding access (that is, restricted mode) to protected information held by the terminal 20 (step B10). It is to be noted that in a case where an application cannot be executed without using protected information stored in the terminal 20, when it is not determined by voiceprint authentication that the user is legitimate, the execution means 22 need not execute (or start up) an application.
- step B3 When performing the voiceprint authentication (step B3), a fixed amount of voice information is necessary. Therefore, where information for voiceprint authentication is lacking in step B3, means may be provided in the terminal 20 that recommends to the user the input of additional voice information. According to the terminal in question, it is possible to improve the accuracy of the voiceprint authentication. When there is no additional speech input, the terminal 20 may be operated in a mode (restricted mode) the same as the case where the voiceprint authentication does not match.
- voiceprint authentication only may be used, without using speech recognition.
- unlocking is performed by the user only speaking to the authentication screen (lock screen), without unlocking the terminal by a finger, and it is possible to obtain result(s) of an Internet voice search and of voice commands or the like.
- the terminal 20 since it is possible to perform authentication regarding whether the user is legitimate by voiceprint authentication, it is possible to prevent fraudulent use of the terminal.
- terminals in related technology normally if user authentication is not completed, it is completely impossible to use the functions of the terminal. According to such terminals, in a case where authentication based on voiceprint fails, keywords for performing speech input search or keywords for speech recognition conversation, inputted by a user by speech, are discarded.
- the terminal 20 of the present exemplary embodiment even in a case where it could not be determined that the user is legitimate, by voiceprint authentication (No in step B5), text data extracted from inputted speech is used in applications (for example, Internet search). Therefore, it is possible to prevent voice information inputted by a user being discarded and wasted when voiceprint authentication fails, and it is possible to dispense with the need for the user to repeat a speech utterance of the same content.
- FIG. 5 is a block diagram showing an example of a configuration of the terminal according to the present exemplary embodiment.
- the terminal 30 is provided with sensor means 34, instead of power activation means 12 as in the terminal 20 ( FIG. 3 ) according to the second exemplary embodiment.
- the sensor means 34 is a sensor that measures a prescribed physical amount (for example, acceleration, temperature, static electricity, or the like).
- a prescribed physical amount for example, acceleration, temperature, static electricity, or the like.
- speech receiving means 14 begins receiving speech in a locked state.
- speech reception by the speech receiving means 14 is started with activation of power supply by an operation on a power button or the like, as a trigger.
- speech reception by the speech receiving means 14 is started with measurement by the sensor means 34 as a trigger.
- An accelerometer or a gyro sensor may be used as the sensor means 34, to detect shaking of the terminal 20.
- a sensor that detects heat or static electricity on a surface of the terminal 20 may also be used.
- the terminal by only a user lifting up the terminal 20 and speaking to the terminal 20 as it is, for example, the terminal is unlocked, and it is possible to obtain result(s) of executing an application based on a speech recognition function. Since speech reception is not started until the prescribed physical amount is measured by the sensor 34, it is possible to reduce power when in standby.
- FIG. 5 is a block diagram showing an example of a configuration of the terminal 30 according to the present exemplary embodiment.
- sensor means 34 detects orientation (for example, vertical, horizontal, inclined), or a connection state of the terminal 30 with respect to peripheral equipment, or the like.
- the sensor means 34 detects a state where the terminal is held in a vertical orientation in the hand of the user, a state where the terminal is held in a horizontal orientation in the hand of the user, a state where the terminal is arranged on a charging stand (cradle), a state where the terminal is arranged in a car cradle (that is, a cradle attached to the car dashboard or similar), or the like.
- the terminal 30 of the present exemplary embodiment operates, for example, as follows. In a case where the terminal 30 is vertically positioned, operations may be the same as in the third exemplary embodiment.
- speech receiving means 14 continuously performs a speech receiving operation.
- speech recognition means 18 determines that the inputted speech is that of the owner.
- execution means 22 executes an application using the text data obtained by the speech recognition.
- the execution means 22 may start up a car navigation application associated with driving a car, a map application, an application providing traffic information, or the like, and may display the result(s) of an information search with a browser.
- the execution means 22 may display a clock application, a movie display, or the result(s) of an information search with a browser.
- the execution means 22 may extract a television application, a camera application, or the like, and may display an icon for starting up these applications at the top of a list display.
- the terminal 30 of the present exemplary embodiment it is possible to appropriately select an application to be executed using the result(s) of speech recognition in accordance with the state in which the terminal is positioned, and to display content as anticipated by a user, as an execution result of an application. According to the terminal 30, it is possible to display a list of icons of applications anticipated by the user. Therefore, according to the terminal 30 of the present exemplary embodiment, the user can obtain desired result(s) as application execution result(s), and furthermore, can easily start up a desired application.
- FIG. 6 shows an example of content displayed in the display means 26 of the terminal 20 in the present example.
- the example assumes that an application using text data in which a user's speech is recognized is an Internet search application.
- FIG. 6 (a) shows display content before the user operates a power button. In this state, the speech receiving means 14 of the terminal 20 is not receiving speech.
- the power activation means 12 activates the power supply to the terminal 20 (step B1 in FIG. 4 ). Then the speech receiving means 14 starts an operation of receiving speech with the terminal 20 in a locked state (step B2).
- FIG. 6(b) shows an example of a screen in a locked state.
- the voiceprint authentication means 16 When the speech receiving means 14 receives speech, the voiceprint authentication means 16 performs voiceprint authentication based on the speech received in the locked state (step B3).
- the speech recognition means 18 converts the speech received in the locked state to text data by speech recognition.
- FIG. 6 (c) shows a situation where the voiceprint authentication means 16 and the speech recognition means 18 are operating.
- the terminal 20 when a hardware key is operated, for example, the terminal 20 starts speech reception in a locked state, and performs voiceprint authentication and speech recognition. Therefore, the user need not expressly make an utterance in order to perform unlocking, and may utter a keyword to be searched by an Internet search, directed to the terminal 20 in the locked state.
- content uttered by the user is "Venue for tomorrow's Sumida River fireworks display.”
- the voiceprint authentication means 16 compares the voiceprint of speech uttered by the user and the voiceprint of the legitimate user as recorded in the voiceprint storage means 28, and determines whether or not the user is legitimate (step B3).
- the speech recognition means 18 performs speech recognition of speech uttered by the user, and converts it to "Venue for tomorrow's Sumida River fireworks display" (step B4).
- the execution means 22 performs an Internet search using the keywords of "Venue for tomorrow's Sumida River fireworks display," while allowing access to protected information (for example, cookie information) stored in the terminal 20, and outputs a search result to the display means 26.
- protected information for example, cookie information
- the execution means 22 extracts applications related to words included in the text data of "Venue for tomorrow's Sumida River fireworks display," and displays icons for starting up the extracted applications on the display means 26 (step B7). It is to be noted that in a case where an application related to words included in the text data is clear, the execution means may execute an application using the text data, and show execution result(s) on the display means 26.
- a result 44 is displayed, where a map application, which is an application related to the keyword "venue,” is executed with the keywords of "Venue for tomorrow's Sumida River fireworks display.” Furthermore, in the middle part of FIG. 6 (b) , as applications related to words included in the text data of "Venue for tomorrow's Sumida River fireworks display," an icon 46 for starting up a camera application, an icon 47 for starting up a public transport transfer information application, and an icon 48 for starting up a social media application are displayed.
- the terminal 20 starts operations in a restricted mode (for example, guest mode).
- a restricted mode for example, guest mode
- the execution means 22 performs only Internet search, and does not read identification number or protected information that is stored in the terminal 20.
- a browser does not disclose any information of the terminal 20, and operates in a mode (secret mode) that discards cookie information.
- the execution means 22 performs an Internet search with text data obtained by speech recognition: "Venue for tomorrow's Sumida River fireworks display" as keywords (step B10), obtains search result(s) as a list, and displays the list on the display means 26.
- FIG. 6 (e) shows result(s) 52 of the Internet search at this time. Thereafter, the execution means 22 performs browsing in a secure mode browser.
- the user of the terminal 20 can unlock the terminal and obtain Internet search result(s).
- a specific description is given concerning operations of the terminal 20 ( FIG. 3 ) according to the second exemplary embodiment.
- the present example assumes an application using text data in which a user's voice is recognized to be a telephone calling application. In the following, a description is given concerning differences from the first example.
- a user utters the telephone number of another party, for example, to the terminal 20 that is in a locked state.
- the content uttered by the user is assumed to be "01234567890.”
- the speech recognition means 18 performs speech recognition of speech uttered by the user, and converts it to "01234567890" (step B4).
- the execution means 22 makes a call to the other party's telephone number "01234567890," using a telephone number assigned to the terminal 20, for example, as protected information that is stored in the terminal 20. In this way, a voice call with the other party is possible.
- the terminal 20 starts operations in a restricted mode (for example, a guest mode).
- a restricted mode for example, a guest mode
- the execution means 22 cannot read information (for example, the telephone number assigned to the terminal 20) stored in the terminal 20, and waits for call processing to be performed.
- the user of the terminal 20 can unlock the terminal and can start a voice call with the other party.
- a terminal may be the terminal according to the first aspect described above.
- the terminal may comprise power activation means that activates a power supply to the terminal if a prescribed operation is detected, wherein the speech receiving means may start receiving speech in the locked state if the power supply to the terminal is activated in response to the prescribed operation.
- the terminal may comprise sensor means that measures a prescribed physical amount, wherein the speech receiving means may start receiving speech in the locked state if the physical amount measured by the sensor means is a prescribed value.
- the execution means may execute the application using the result of the speech recognition while allowing access to protected information stored in the terminal if the voiceprint authentication determined that the user is legitimate.
- the execution means may execute the application using the result of the speech recognition, while forbidding access to protected information stored in the terminal if the voiceprint authentication does not determine that the user is legitimate.
- the execution means may extract an application(s) related to word(s) included in the result of the speech recognition and display a list of the extracted application(s) on a screen of the terminal if the voiceprint authentication determines that the user is legitimate.
- the execution means may extract an application(s) according to orientation of the terminal or type of a peripheral device to which the terminal is connected and display a list of the extracted application(s) on a screen of the terminal if the voiceprint authentication determines that the user is legitimate.
- An unlocking method may be the unlocking method according to the second aspect described above.
- the unlocking method may comprise: by the terminal, activating a power supply to the terminal if a prescribed operation is detected by the terminal, wherein speech reception in the locked state is started if a power supply to the terminal is activated in response to the prescribed operation.
- the unlocking method may comprise: by the terminal, measuring a prescribed physical amount by the terminal, wherein speech reception in the locked state is started if the measured physical amount is a prescribed value.
- the terminal may execute the application using the result of the speech recognition while allowing access to protected information stored in the terminal if the voiceprint authentication determines that a user is legitimate.
- the terminal may execute the application using the result of the speech recognition while forbidding access to protected information stored in the terminal if the voiceprint authentication does not determine that the user is legitimate.
- the unlocking method may comprise: by the terminal, extracting an application(s) related to word(s) included in the result of the speech recognition if the voiceprint authentication determines that the user is legitimate; and displaying a list of the extracted application(s) on a screen of the terminal.
- the unlocking method may comprise: by the terminal, extracting an application(s) according to orientation of the terminal, or type of a peripheral device to which the terminal is connected if the voiceprint authentication determines that the user is legitimate; and displaying a list of the extracted application(s) on a screen of the terminal.
- a program may be the program according to the third aspect described above.
- the program may cause the computer to execute: activating a power supply to the terminal if a prescribed operation is detected; and starting speech reception in the locked state if the power supply to the terminal is activated in response to the prescribed operation.
- the program may cause the computer to execute: measuring a prescribed physical amount; and starting speech reception in the locked state if the measured physical amount is a prescribed value.
- the program may cause the computer to execute: executing the application using the result of the speech recognition, while allowing access to protected information stored in the terminal if the voiceprint authentication determines that the user is legitimate.
- the program may cause the computer to execute: executing the application using the result of the speech recognition while forbidding access to protected information stored in the terminal if the voiceprint authentication does not determine that the user is legitimate.
- the program may cause the computer to execute: extracting an application(s) related to word(s) included in the result of the speech recognition if the voiceprint authentication determines that the user is legitimate; and displaying a list of the extracted application(s) on a screen of the terminal.
- the program may cause the computer to execute: extracting an application(s) according to orientation of the terminal, or type of a peripheral device to which the terminal is connected if the voiceprint authentication determines that the user is legitimate; and displaying a list of the extracted application(s) on a screen of the terminal.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Multimedia (AREA)
- General Physics & Mathematics (AREA)
- Acoustics & Sound (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Artificial Intelligence (AREA)
- Computational Linguistics (AREA)
- Telephone Function (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2013002387 | 2013-01-10 | ||
PCT/JP2014/050180 WO2014109344A1 (fr) | 2013-01-10 | 2014-01-09 | Terminal, procédé de déverrouillage et programme |
Publications (2)
Publication Number | Publication Date |
---|---|
EP2945090A1 true EP2945090A1 (fr) | 2015-11-18 |
EP2945090A4 EP2945090A4 (fr) | 2016-08-17 |
Family
ID=51166991
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP14738232.9A Withdrawn EP2945090A4 (fr) | 2013-01-10 | 2014-01-09 | Terminal, procédé de déverrouillage et programme |
Country Status (5)
Country | Link |
---|---|
US (2) | US10134392B2 (fr) |
EP (1) | EP2945090A4 (fr) |
JP (1) | JP6149868B2 (fr) |
CN (1) | CN104937603B (fr) |
WO (1) | WO2014109344A1 (fr) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3244294A4 (fr) * | 2015-02-16 | 2018-01-24 | ZTE Corporation | Procédé et dispositif de protection de sécurité basée sur une reconnaissance d'empreinte vocale |
JP2019152867A (ja) * | 2014-07-18 | 2019-09-12 | グーグル エルエルシー | コロケーション情報を使用した話者照合 |
WO2020000637A1 (fr) * | 2018-06-27 | 2020-01-02 | 平安科技(深圳)有限公司 | Procédé, appareil et dispositif de commande d'équipement à base de son, et support d'informations |
CN111641751A (zh) * | 2020-05-20 | 2020-09-08 | Oppo广东移动通信有限公司 | 终端设备的屏幕解锁方法和装置 |
US11676608B2 (en) | 2021-04-02 | 2023-06-13 | Google Llc | Speaker verification using co-location information |
US11942095B2 (en) | 2014-07-18 | 2024-03-26 | Google Llc | Speaker verification using co-location information |
Families Citing this family (47)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20130096978A (ko) * | 2012-02-23 | 2013-09-02 | 삼성전자주식회사 | 사용자 단말, 서버, 상황기반 정보 제공 시스템 및 그 방법 |
AU2014275224B2 (en) * | 2013-06-08 | 2017-08-31 | Apple Inc. | Device, method, and graphical user interface for synchronizing two or more displays |
CN105357006A (zh) * | 2014-08-20 | 2016-02-24 | 中兴通讯股份有限公司 | 一种基于声纹特征进行安全认证的方法及设备 |
CN105469791A (zh) * | 2014-09-04 | 2016-04-06 | 中兴通讯股份有限公司 | 业务处理方法及装置 |
CN104202486A (zh) * | 2014-09-26 | 2014-12-10 | 上海华勤通讯技术有限公司 | 移动终端及其屏幕解锁方法 |
JP2016122980A (ja) * | 2014-12-25 | 2016-07-07 | 京セラ株式会社 | タッチスクリーン付情報処理端末、情報処理方法および情報処理プログラム |
US9654978B2 (en) * | 2015-02-03 | 2017-05-16 | Qualcomm Incorporated | Asset accessibility with continuous authentication for mobile devices |
KR102346302B1 (ko) * | 2015-02-16 | 2022-01-03 | 삼성전자 주식회사 | 전자 장치 및 음성 인식 기능 운용 방법 |
JP2016206428A (ja) * | 2015-04-23 | 2016-12-08 | 京セラ株式会社 | 電子機器および声紋認証方法 |
KR101830657B1 (ko) * | 2015-04-27 | 2018-02-21 | 엘지전자 주식회사 | 이동 단말기 및 그것의 제어방법 |
EP3091422B1 (fr) * | 2015-05-08 | 2020-06-24 | Nokia Technologies Oy | Procédé, appareil et produit de programme d'ordinateur permettant d'entrer des états de fonctionnement basés sur un type d'entrée |
US10073959B2 (en) * | 2015-06-19 | 2018-09-11 | International Business Machines Corporation | Secure authentication of users of devices using tactile and voice sequencing with feedback |
CN106601238A (zh) * | 2015-10-14 | 2017-04-26 | 阿里巴巴集团控股有限公司 | 一种应用操作的处理方法和装置 |
CN106815507A (zh) * | 2015-11-30 | 2017-06-09 | 中兴通讯股份有限公司 | 语音唤醒实现方法、装置及终端 |
CN105472159A (zh) * | 2015-12-17 | 2016-04-06 | 青岛海信移动通信技术股份有限公司 | 一种多用户解锁的方法及装置 |
CN105721913A (zh) * | 2015-12-18 | 2016-06-29 | 中科创达软件科技(深圳)有限公司 | 一种多媒体文件续播方法及装置 |
JP2017151735A (ja) * | 2016-02-25 | 2017-08-31 | 大日本印刷株式会社 | 携帯型デバイス及びプログラム |
CN105930055A (zh) * | 2016-04-19 | 2016-09-07 | 乐视控股(北京)有限公司 | 一种界面跳转管理的方法及装置 |
CN106056710A (zh) * | 2016-06-02 | 2016-10-26 | 北京云知声信息技术有限公司 | 一种控制智能电子锁的方法和装置 |
US10621581B2 (en) | 2016-06-11 | 2020-04-14 | Apple Inc. | User interface for transactions |
US9842330B1 (en) | 2016-09-06 | 2017-12-12 | Apple Inc. | User interfaces for stored-value accounts |
JP6693857B2 (ja) * | 2016-10-27 | 2020-05-13 | 京セラ株式会社 | 電子機器、電子機器の動作方法および制御プログラム |
CN108279839A (zh) * | 2017-01-05 | 2018-07-13 | 阿里巴巴集团控股有限公司 | 基于语音的交互方法、装置、电子设备及操作系统 |
CN106920303A (zh) * | 2017-01-21 | 2017-07-04 | 云丁网络技术(北京)有限公司 | 一种基于语音识别的开锁方法及其智能门锁系统 |
US10360916B2 (en) | 2017-02-22 | 2019-07-23 | Plantronics, Inc. | Enhanced voiceprint authentication |
CN108509119B (zh) * | 2017-02-28 | 2023-06-02 | 三星电子株式会社 | 用于功能执行的电子设备的操作方法和支持其的电子设备 |
US11221744B2 (en) | 2017-05-16 | 2022-01-11 | Apple Inc. | User interfaces for peer-to-peer transfers |
CN110999228A (zh) | 2017-05-16 | 2020-04-10 | 苹果公司 | 用于对等传输的用户界面 |
CN107644645A (zh) * | 2017-09-29 | 2018-01-30 | 联想(北京)有限公司 | 一种语音控制方法、装置及电子设备 |
JP6979846B2 (ja) * | 2017-10-12 | 2021-12-15 | Omデジタルソリューションズ株式会社 | 情報取得機器、情報取得システム及び情報取得方法 |
EP3698358A1 (fr) * | 2017-10-18 | 2020-08-26 | Soapbox Labs Ltd. | Procédés et systèmes de traitement de signaux audio contenant des données vocales |
CN108010519A (zh) * | 2017-11-10 | 2018-05-08 | 上海爱优威软件开发有限公司 | 一种信息搜索方法及系统 |
CN111557002A (zh) | 2018-03-21 | 2020-08-18 | 谷歌有限责任公司 | 安全处理环境中的数据传输 |
US10991373B1 (en) * | 2018-05-29 | 2021-04-27 | Amazon Technologies, Inc. | Voice command processing for locked devices |
CN112219203A (zh) | 2018-06-03 | 2021-01-12 | 苹果公司 | 用于转账账户的用户界面 |
US11100498B2 (en) | 2018-06-03 | 2021-08-24 | Apple Inc. | User interfaces for transfer accounts |
CN109448734A (zh) * | 2018-09-20 | 2019-03-08 | 李庆湧 | 基于声纹的终端设备解锁及应用启动方法以及装置 |
CN109446775A (zh) * | 2018-10-18 | 2019-03-08 | 维沃移动通信有限公司 | 一种声控方法及电子设备 |
US11328352B2 (en) | 2019-03-24 | 2022-05-10 | Apple Inc. | User interfaces for managing an account |
CN110111794A (zh) * | 2019-04-16 | 2019-08-09 | 深圳壹账通智能科技有限公司 | 应用程序的启动方法、装置、计算机设备及存储介质 |
WO2021051403A1 (fr) * | 2019-09-20 | 2021-03-25 | 深圳市汇顶科技股份有限公司 | Procédé de commande vocale et appareil, puce, écouteurs et système |
CN111091638A (zh) * | 2019-11-25 | 2020-05-01 | 星络智能科技有限公司 | 存储介质、智能门锁及其鉴权方法 |
CN113849792A (zh) * | 2020-06-10 | 2021-12-28 | 瑞昱半导体股份有限公司 | 适于具有锁定功能的电子装置的电子组件及解除锁定方法 |
US11983702B2 (en) | 2021-02-01 | 2024-05-14 | Apple Inc. | Displaying a representation of a card with a layered structure |
US20220262370A1 (en) * | 2021-02-17 | 2022-08-18 | Validsoft Limited | Processing Input Data |
US11921992B2 (en) | 2021-05-14 | 2024-03-05 | Apple Inc. | User interfaces related to time |
US11784956B2 (en) | 2021-09-20 | 2023-10-10 | Apple Inc. | Requests to add assets to an asset account |
Family Cites Families (87)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU95103479A (ru) | 1994-03-11 | 1996-12-27 | Уолкер Эссет Мэнеджмент Лимитед Партнершип (US) | Игровая система, игровой компьютер, способ проведения игры, лотереи с участием игрока |
US5940799A (en) * | 1997-09-15 | 1999-08-17 | Motorola, Inc. | System and method for securing speech transactions |
US6145083A (en) * | 1998-04-23 | 2000-11-07 | Siemens Information And Communication Networks, Inc. | Methods and system for providing data and telephony security |
JP2000099076A (ja) | 1998-09-25 | 2000-04-07 | Fujitsu Ltd | 音声認識を活用した実行環境設定装置及び方法 |
JP3231723B2 (ja) | 1999-02-02 | 2001-11-26 | 埼玉日本電気株式会社 | 音声によるダイヤルロック設定方式およびその解除方式 |
US6404859B1 (en) * | 1999-03-16 | 2002-06-11 | Lockheed Martin Corporation | Voice enabled system for remote access of information |
US8648692B2 (en) * | 1999-07-23 | 2014-02-11 | Seong Sang Investments Llc | Accessing an automobile with a transponder |
US6952155B2 (en) * | 1999-07-23 | 2005-10-04 | Himmelstein Richard B | Voice-controlled security system with proximity detector |
US6370233B1 (en) * | 1999-08-03 | 2002-04-09 | Ameritech Corporation | Security system with call management functionality |
JP2001319045A (ja) * | 2000-05-11 | 2001-11-16 | Matsushita Electric Works Ltd | 音声マンマシンインタフェースを用いたホームエージェントシステム、及びプログラム記録媒体 |
WO2002058189A1 (fr) * | 2000-10-20 | 2002-07-25 | Donnelly Corporation | Retroviseur externe avec antenne |
US9836257B2 (en) | 2001-01-19 | 2017-12-05 | Flexiworld Technologies, Inc. | Mobile information apparatus that includes intelligent wireless display, wireless direct display, or transfer of digital content for playing over air the digital content at smart televisions, television controllers, or audio output devices |
JP2002236666A (ja) | 2001-02-09 | 2002-08-23 | Matsushita Electric Ind Co Ltd | 個人認証装置 |
JP2002312318A (ja) | 2001-04-13 | 2002-10-25 | Nec Corp | 電子装置、本人認証方法およびプログラム |
JP2003345390A (ja) * | 2002-05-23 | 2003-12-03 | Matsushita Electric Ind Co Ltd | 音声処理装置及びリモートコントローラ装置 |
TW200409525A (en) | 2002-11-26 | 2004-06-01 | Lite On Technology Corp | Voice identification method for cellular phone and cellular phone with voiceprint password |
US20070198262A1 (en) | 2003-08-20 | 2007-08-23 | Mindlin Bernardo G | Topological voiceprints for speaker identification |
US20050132420A1 (en) * | 2003-12-11 | 2005-06-16 | Quadrock Communications, Inc | System and method for interaction with television content |
US7555568B2 (en) | 2004-02-28 | 2009-06-30 | Huang Evan S | Method and apparatus for operating a host computer from a portable apparatus |
US20060106605A1 (en) | 2004-11-12 | 2006-05-18 | Saunders Joseph M | Biometric record management |
US20060206381A1 (en) * | 2005-03-12 | 2006-09-14 | Felix Frayman | Method and system for creating interactive guides and information exchange services |
US7522060B1 (en) * | 2005-04-25 | 2009-04-21 | Anytransactions, Inc. | Graduated sanction/progressive response system and method for automated monitoring, scheduling and notification |
JP2007140048A (ja) | 2005-11-17 | 2007-06-07 | Oki Electric Ind Co Ltd | 音声認識システム |
US20090328169A1 (en) | 2006-01-25 | 2009-12-31 | Keith Hutchison | Apparatus and method for convenient and secure access to websites |
US20070245882A1 (en) * | 2006-04-04 | 2007-10-25 | Odenwald Michael J | Interactive computerized digital media management system and method |
US7925511B2 (en) * | 2006-09-29 | 2011-04-12 | Nellcor Puritan Bennett Llc | System and method for secure voice identification in a medical device |
US9591392B2 (en) | 2006-11-06 | 2017-03-07 | Plantronics, Inc. | Headset-derived real-time presence and communication systems and methods |
US9055413B2 (en) | 2006-11-06 | 2015-06-09 | Plantronics, Inc. | Presence over existing cellular and land-line telephone networks |
US20080256613A1 (en) | 2007-03-13 | 2008-10-16 | Grover Noel J | Voice print identification portal |
US8676273B1 (en) * | 2007-08-24 | 2014-03-18 | Iwao Fujisaki | Communication device |
US7821383B2 (en) * | 2007-10-10 | 2010-10-26 | Delphi Technologies, Inc. | Apparatus for medium-range vehicle communications and control |
US8639214B1 (en) * | 2007-10-26 | 2014-01-28 | Iwao Fujisaki | Communication device |
CN101464773A (zh) * | 2007-12-19 | 2009-06-24 | 神基科技股份有限公司 | 随使用者位置而显示程序执行视窗的方法与电脑系统 |
US8140340B2 (en) * | 2008-01-18 | 2012-03-20 | International Business Machines Corporation | Using voice biometrics across virtual environments in association with an avatar's movements |
US8910299B2 (en) * | 2008-02-08 | 2014-12-09 | Steven Charles Michalske | Emergency information access on portable electronic devices |
US8312660B1 (en) * | 2008-05-09 | 2012-11-20 | Iwao Fujisaki | Firearm |
US8700008B2 (en) * | 2008-06-27 | 2014-04-15 | Microsoft Corporation | Providing data service options in push-to-talk using voice recognition |
US8345829B2 (en) * | 2008-10-13 | 2013-01-01 | International Business Machines Corporation | Authentication of a user to a telephonic communication device |
US8190437B2 (en) | 2008-10-24 | 2012-05-29 | Nuance Communications, Inc. | Speaker verification methods and apparatus |
US8332223B2 (en) | 2008-10-24 | 2012-12-11 | Nuance Communications, Inc. | Speaker verification methods and apparatus |
US8095368B2 (en) | 2008-12-04 | 2012-01-10 | At&T Intellectual Property I, L.P. | System and method for voice authentication over a computer network |
CA2748695C (fr) * | 2008-12-31 | 2017-11-07 | Bce Inc. | Systeme et procede pour deverrouiller un dispositif |
US8483659B2 (en) * | 2009-02-26 | 2013-07-09 | Qualcomm Incorporated | Methods and systems for recovering lost or stolen mobile devices |
US8539382B2 (en) * | 2009-04-03 | 2013-09-17 | Palm, Inc. | Preventing unintentional activation and/or input in an electronic device |
JP5638210B2 (ja) * | 2009-08-27 | 2014-12-10 | 京セラ株式会社 | 携帯電子機器 |
WO2011028844A2 (fr) * | 2009-09-02 | 2011-03-10 | Sri International | Procédé et appareil permettant d'adapter la sortie d'un assistant automatisé intelligent à un utilisateur |
CN101673544B (zh) | 2009-10-10 | 2012-07-04 | 上海电虹软件有限公司 | 一种基于声纹识别和定位跟踪的交叉监控方法和系统 |
JP5257320B2 (ja) * | 2009-10-15 | 2013-08-07 | 日本電気株式会社 | 携帯端末装置、その制御方法、及び、プログラム |
US8717285B1 (en) * | 2009-10-28 | 2014-05-06 | Amazon Technologies, Inc. | Orientation lock |
CN101742603A (zh) * | 2009-11-20 | 2010-06-16 | 华为终端有限公司 | 提示终端用户切换模式的方法及移动终端 |
JP5361070B2 (ja) * | 2009-11-27 | 2013-12-04 | 京セラ株式会社 | 携帯電子機器 |
US8407762B2 (en) | 2010-07-01 | 2013-03-26 | Tata Consultancy Services Ltd. | System for three level authentication of a user |
US8811948B2 (en) * | 2010-07-09 | 2014-08-19 | Microsoft Corporation | Above-lock camera access |
CN102004906A (zh) * | 2010-11-18 | 2011-04-06 | 无锡中星微电子有限公司 | 人脸识别系统及方法 |
US10032455B2 (en) | 2011-01-07 | 2018-07-24 | Nuance Communications, Inc. | Configurable speech recognition system using a pronunciation alignment between multiple recognizers |
US9262612B2 (en) * | 2011-03-21 | 2016-02-16 | Apple Inc. | Device access using voice authentication |
US9444816B2 (en) * | 2011-03-30 | 2016-09-13 | Qualcomm Incorporated | Continuous voice authentication for a mobile device |
US9606643B2 (en) * | 2011-05-02 | 2017-03-28 | Microsoft Technology Licensing, Llc | Extended above the lock-screen experience |
US9256719B2 (en) | 2011-05-18 | 2016-02-09 | Nextgenid, Inc. | Multi-biometric enrollment kiosk including biometric enrollment and verification, face recognition and fingerprint matching systems |
US9076008B1 (en) * | 2011-06-27 | 2015-07-07 | Amazon Technologies, Inc. | Content protection on an electronic device |
US20130073293A1 (en) * | 2011-09-20 | 2013-03-21 | Lg Electronics Inc. | Electronic device and method for controlling the same |
AU2011235942B2 (en) * | 2011-10-11 | 2015-01-22 | Nicholas Charles Dooner | Safetytrim nut locking device |
US9016997B2 (en) * | 2011-10-11 | 2015-04-28 | Safety Trim Worldwide Holdings, Ltd. | Sensing safety devices |
US9063629B2 (en) * | 2011-10-31 | 2015-06-23 | Nokia Technologies Oy | Responding to a received message in a locked user interaction mode |
US9223948B2 (en) | 2011-11-01 | 2015-12-29 | Blackberry Limited | Combined passcode and activity launch modifier |
US8732822B2 (en) * | 2011-12-16 | 2014-05-20 | Microsoft Corporation | Device locking with hierarchical activity preservation |
US20130179219A1 (en) * | 2012-01-09 | 2013-07-11 | Bank Of America Corporation | Collection and management of feeds for predictive analytics platform |
US20130205312A1 (en) * | 2012-02-03 | 2013-08-08 | Novatek Microelectronics Corp. | Image display device and operation method therefor |
US20130238326A1 (en) * | 2012-03-08 | 2013-09-12 | Lg Electronics Inc. | Apparatus and method for multiple device voice control |
CN102647521B (zh) | 2012-04-05 | 2013-10-09 | 福州博远无线网络科技有限公司 | 基于语音短命令和声纹技术解除手机锁屏的方法 |
US9153235B2 (en) | 2012-04-09 | 2015-10-06 | Sony Computer Entertainment Inc. | Text dependent speaker recognition with long-term feature based on functional data analysis |
US20130282588A1 (en) * | 2012-04-22 | 2013-10-24 | John Hruska | Consumer, Merchant and Mobile Device Specific, Real-Time Dynamic Tokenization Activation within a Secure Mobile-Wallet Financial Transaction System |
KR101946364B1 (ko) * | 2012-05-01 | 2019-02-11 | 엘지전자 주식회사 | 적어도 하나의 마이크 센서를 갖는 모바일 디바이스 및 그 제어방법 |
US20130298208A1 (en) | 2012-05-06 | 2013-11-07 | Mourad Ben Ayed | System for mobile security |
KR20130133629A (ko) | 2012-05-29 | 2013-12-09 | 삼성전자주식회사 | 전자장치에서 음성명령을 실행시키기 위한 장치 및 방법 |
US10156455B2 (en) * | 2012-06-05 | 2018-12-18 | Apple Inc. | Context-aware voice guidance |
US9881616B2 (en) | 2012-06-06 | 2018-01-30 | Qualcomm Incorporated | Method and systems having improved speech recognition |
US10089625B2 (en) * | 2012-06-13 | 2018-10-02 | First Data Corporation | Systems and methods for tokenizing financial information |
US9251792B2 (en) * | 2012-06-15 | 2016-02-02 | Sri International | Multi-sample conversational voice verification |
US8543834B1 (en) * | 2012-09-10 | 2013-09-24 | Google Inc. | Voice authentication and command |
US10276157B2 (en) * | 2012-10-01 | 2019-04-30 | Nuance Communications, Inc. | Systems and methods for providing a voice agent user interface |
US20140108010A1 (en) * | 2012-10-11 | 2014-04-17 | Intermec Ip Corp. | Voice-enabled documents for facilitating operational procedures |
US8543397B1 (en) * | 2012-10-11 | 2013-09-24 | Google Inc. | Mobile device voice activation |
US9516022B2 (en) | 2012-10-14 | 2016-12-06 | Getgo, Inc. | Automated meeting room |
CN103873642A (zh) | 2012-12-10 | 2014-06-18 | 北京三星通信技术研究有限公司 | 记载通话记录的方法及设备 |
US9154931B2 (en) * | 2012-12-19 | 2015-10-06 | Steven Diamond | Synoptic emergency cellular device and system |
US20140320391A1 (en) * | 2012-12-28 | 2014-10-30 | Gaurav BAZAZ | Methods for improvements in mobile electronic devices |
-
2014
- 2014-01-09 CN CN201480004395.0A patent/CN104937603B/zh active Active
- 2014-01-09 US US14/758,290 patent/US10134392B2/en active Active
- 2014-01-09 WO PCT/JP2014/050180 patent/WO2014109344A1/fr active Application Filing
- 2014-01-09 EP EP14738232.9A patent/EP2945090A4/fr not_active Withdrawn
- 2014-01-09 JP JP2014556426A patent/JP6149868B2/ja active Active
-
2018
- 2018-06-13 US US16/006,992 patent/US10147420B2/en active Active
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2019152867A (ja) * | 2014-07-18 | 2019-09-12 | グーグル エルエルシー | コロケーション情報を使用した話者照合 |
US11942095B2 (en) | 2014-07-18 | 2024-03-26 | Google Llc | Speaker verification using co-location information |
EP3244294A4 (fr) * | 2015-02-16 | 2018-01-24 | ZTE Corporation | Procédé et dispositif de protection de sécurité basée sur une reconnaissance d'empreinte vocale |
WO2020000637A1 (fr) * | 2018-06-27 | 2020-01-02 | 平安科技(深圳)有限公司 | Procédé, appareil et dispositif de commande d'équipement à base de son, et support d'informations |
CN111641751A (zh) * | 2020-05-20 | 2020-09-08 | Oppo广东移动通信有限公司 | 终端设备的屏幕解锁方法和装置 |
CN111641751B (zh) * | 2020-05-20 | 2021-04-02 | Oppo广东移动通信有限公司 | 终端设备的屏幕解锁方法、装置、终端设备及存储介质 |
US11676608B2 (en) | 2021-04-02 | 2023-06-13 | Google Llc | Speaker verification using co-location information |
Also Published As
Publication number | Publication date |
---|---|
US10147420B2 (en) | 2018-12-04 |
US20180293975A1 (en) | 2018-10-11 |
CN104937603A (zh) | 2015-09-23 |
WO2014109344A1 (fr) | 2014-07-17 |
JPWO2014109344A1 (ja) | 2017-01-19 |
EP2945090A4 (fr) | 2016-08-17 |
US10134392B2 (en) | 2018-11-20 |
US20150340025A1 (en) | 2015-11-26 |
CN104937603B (zh) | 2018-09-25 |
JP6149868B2 (ja) | 2017-06-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10147420B2 (en) | Terminal, unlocking method, and program | |
CN103477342B (zh) | 使用话音验证的装置存取 | |
KR101889054B1 (ko) | 잠금 컴퓨팅 디바이스에 대한 입력 | |
US8316436B2 (en) | User-defined multiple input mode authentication | |
US20170372298A1 (en) | Method and apparatus for activating virtual card | |
CN105281906B (zh) | 安全验证方法及装置 | |
EP3147768A1 (fr) | Procédé de déverrouillage d'interface d'écran et dispositif de déverrouillage d'interface d'écran | |
CN103079000B (zh) | 一种终端解锁的方法及装置 | |
US20150294101A1 (en) | Running applications, and authenticating users | |
JP2018074366A (ja) | 電子機器、制御方法およびプログラム | |
CN103745144A (zh) | 一种终端及终端解锁方法 | |
KR20150080736A (ko) | 전자 장치의 기능 실행 방법 및 이를 사용하는 전자 장치 | |
US20130067566A1 (en) | Device to perform authentication according to surrounding information and method for performing authentication | |
EP2801905B1 (fr) | Procédé et appareil permettant de déverrouiller un dispositif terminal | |
CN111758095A (zh) | 快速打开应用或应用功能的方法及终端 | |
KR20140034088A (ko) | 제스쳐-및 표현-기반 인증 | |
KR20150025577A (ko) | 잠금 화면 상에서 필기 형태의 사용자 입력과 관련된 기능을 실행하기 위한 장치 및 방법 | |
KR20130032596A (ko) | 휴대용 단말기에서 자동 화면 회전을 방지하기 위한 장치 및 방법 | |
WO2019101096A1 (fr) | Procédé et dispositif de vérification de sécurité et terminal mobile | |
CN104067525A (zh) | 在移动终端中在各阶段解锁的方法及其移动终端 | |
WO2016165245A1 (fr) | Procédé et terminal de commande d'interface utilisateur | |
KR101971008B1 (ko) | 상황 인지를 이용한 단말의 제어 방법 및 그 단말 | |
CN103077341A (zh) | 一种应用程序解锁方法及装置 | |
CN103391354A (zh) | 信息保密系统及信息保密方法 | |
US8112631B2 (en) | Password input device, computer security system using the same and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20150808 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAX | Request for extension of the european patent (deleted) | ||
A4 | Supplementary search report drawn up and despatched |
Effective date: 20160715 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G10L 15/00 20130101ALI20160712BHEP Ipc: G10L 17/00 20130101ALI20160712BHEP Ipc: G07C 9/00 20060101ALI20160712BHEP Ipc: G06F 21/32 20130101AFI20160712BHEP Ipc: G10L 17/22 20130101ALI20160712BHEP Ipc: G10L 15/07 20130101ALI20160712BHEP Ipc: G10L 15/22 20060101ALI20160712BHEP |
|
17Q | First examination report despatched |
Effective date: 20180615 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN |
|
18W | Application withdrawn |
Effective date: 20181206 |